<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Sony Pictures hack was a long time coming, say former employees &#8212; Fusion</title>
	<atom:link href="http://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 19:43:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-3/#comment-1484805</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 08:39:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1484805</guid>
		<description><![CDATA[Damian Dovarganes / Associated Press:
Judge gives final approval to multimillion dollar settlement in Sony Pictures class-action lawsuit filed by former employees after 2014 data breach

Judge approves settlement in Sony Pictures hacking case
http://hosted.ap.org/dynamic/stories/U/US_SONY_HACK_SETTLEMENT?SITE=AP&amp;SECTION=HOME&amp;TEMPLATE=DEFAULT&amp;CTIME=2016-04-06-16-23-13

A judge on Wednesday approved a multimillion dollar settlement in a class-action lawsuit filed by former Sony Pictures Entertainment employees whose private information was stolen in a massive data breach.

The U.S. government blamed the hack on North Korea in an attempt to derail the release of the North Korean-focused comedy &quot;The Interview.&quot;

U.S. District Judge R. Gary Klausner approved the agreement that gives roughly 437,000 people impacted by the breach identity theft protection from the time of the 2014 hack through 2017.]]></description>
		<content:encoded><![CDATA[<p>Damian Dovarganes / Associated Press:<br />
Judge gives final approval to multimillion dollar settlement in Sony Pictures class-action lawsuit filed by former employees after 2014 data breach</p>
<p>Judge approves settlement in Sony Pictures hacking case<br />
<a href="http://hosted.ap.org/dynamic/stories/U/US_SONY_HACK_SETTLEMENT?SITE=AP&#038;SECTION=HOME&#038;TEMPLATE=DEFAULT&#038;CTIME=2016-04-06-16-23-13" rel="nofollow">http://hosted.ap.org/dynamic/stories/U/US_SONY_HACK_SETTLEMENT?SITE=AP&#038;SECTION=HOME&#038;TEMPLATE=DEFAULT&#038;CTIME=2016-04-06-16-23-13</a></p>
<p>A judge on Wednesday approved a multimillion dollar settlement in a class-action lawsuit filed by former Sony Pictures Entertainment employees whose private information was stolen in a massive data breach.</p>
<p>The U.S. government blamed the hack on North Korea in an attempt to derail the release of the North Korean-focused comedy &#8220;The Interview.&#8221;</p>
<p>U.S. District Judge R. Gary Klausner approved the agreement that gives roughly 437,000 people impacted by the breach identity theft protection from the time of the 2014 hack through 2017.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-3/#comment-1454413</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Nov 2015 17:20:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1454413</guid>
		<description><![CDATA[The leak of information threatened their personal financial futures, and the destruction of property threatened their livelihoods.

Source: http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html]]></description>
		<content:encoded><![CDATA[<p>The leak of information threatened their personal financial futures, and the destruction of property threatened their livelihoods.</p>
<p>Source: <a href="http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html" rel="nofollow">http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-3/#comment-1454411</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 24 Nov 2015 17:19:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1454411</guid>
		<description><![CDATA[Amanda Hess / Slate: 	
Sony employees on the hack, one year later  —  What it was like to be a rank-and-file Sony employee as the unprecedented cyberattack tore the company apart.  —  Every morning, like so many of her colleagues, a television writer would drive from her Hollywood apartment to the Culver City, California, lot of Sony Pictures Entertainment.

Inside the Sony Hack
http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html

What it was like to be a rank-and-file Sony employee as the unprecedented cyberattack tore the company apart.

Every morning, like so many of her colleagues, a television writer would drive from her Hollywood apartment to the Culver City, California, lot of Sony Pictures Entertainment. Greeting her at the gate most days was “this really, really nice woman who said, ‘Happy Monday! Happy Tuesday! Happy Wednesday!’ ” she says. “Like, welcome to the fake small town that you work in!” 

One year ago, on Nov. 24, 2014, there was no “Happy Monday” when the screenwriter approached the Sony lot. Instead the guard told her to pull out her badge and swipe it to unlock the gate herself.

Across the lot, select company computers were playing a movie Sony hadn’t produced. I

It was signed, “Hacked by #GOP.”

Early reviews were lukewarm. “It felt like getting hacked in the early ’90s,” says one Sony employee

 “The message looked like something out of Hackers, the movie. Like, You’ve been hacked, bitch! It was a throwback. Almost cute.” Nobody knew that “it was the beginning of this terrible, awful experience that would stretch on forever and ever.”

Outside Sony, it would eventually seem as if all the studio&#039;s info had been exposed for everyone to see. But inside the studio, nobody could access anything. “Everything was so completely destroyed. It was surreal. Everything was down,” one ex-employee told me. “It wasn’t just one system or one part of the lot or one building. The network was completely chewed up by the virus.&quot;

“It was like a bomb went off,” one staffer says. “We looked around. We were still alive. So we started doing triage.”

The telephone directory vanished. Voicemail was offline. Computers became bricks.  Internet access on the lot was shuttered. The cafeteria went cash-only. Contracts—and the templates those contracts were based on—disappeared. Sony’s online database of stock footage was unsearchable. It was near impossible for Sony to communicate directly with its employees—much less ex-employees, who were also gravely affected by the hack—to inform them of what was even happening and what to do about it. “It was like moving back into an earlier time,” one employee says. The only way to reach other Sony staffers was to dial their number directly—if you could figure out what it was—or hunt them down and talk face to face.

At first, staffers were told that Sony was “working on an IT issue” and that systems should be online again soon. Instructions were relayed “like a game of telephone,” one employee says. 

 When workers first arrived on the lot that Monday morning, they got a message through a security guard or a colleague or a handwritten sign taped up to the wall: Don’t turn on your computer. Later, someone might pop in and deliver the latest directive fourth-hand: “Unplug your computer from the wall.“ Which plug? The network cable? The power cord? Who knows? Just unplug everything. Says one worker: “It was all the hysteria of not knowing.”

In the days after the hack, Sony set up a hotline for employees to call with questions about identity theft. It made psychological counselors available on campus. It had the FBI—whose agents were camped out on the lot for weeks, investigating the hack—host employee seminars on data security. Once email was back online, Sony sent staffers an internal memo nearly every day, most of them signed by Lynton himself. Lynton ate alone in the lot cafeteria and invited employees to come and chat. But company communications were often lacking in specifics—an “IT issue,” huh?—so workers hit their phones in search of answers, texting with colleagues, searching Twitter for the hackers’ hashtag, and passing around cellphone pictures of the spooky pink skeleton to staffers who hadn’t seen it yet. Rumors raced across the lot. Maybe it was North Korea. Or maybe it was that old PR guy who left on bad terms.

Some employees—among them lawyers, HR reps, tech and finance people—had jobs so integrated in Sony’s systems that their regular work ground to a halt. Many were instantly shifted to new duties, working to get systems back online.

“It was an Earth-shattering change,” an ex-employee says. “There was no ability to reference anything else that had happened before the hack.” One Sony contractor told me that, when he failed to receive his regular check a month after the hack, he called the company and was told: “Sorry, how much do we pay you?” Systems that got back online quickly were just a “rough draft,” a “weird middle ground,” and “built on sand,” various workers said—totally temporary and not customized to the actual work.]]></description>
		<content:encoded><![CDATA[<p>Amanda Hess / Slate:<br />
Sony employees on the hack, one year later  —  What it was like to be a rank-and-file Sony employee as the unprecedented cyberattack tore the company apart.  —  Every morning, like so many of her colleagues, a television writer would drive from her Hollywood apartment to the Culver City, California, lot of Sony Pictures Entertainment.</p>
<p>Inside the Sony Hack<br />
<a href="http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html" rel="nofollow">http://www.slate.com/articles/technology/users/2015/11/sony_employees_on_the_hack_one_year_later.single.html</a></p>
<p>What it was like to be a rank-and-file Sony employee as the unprecedented cyberattack tore the company apart.</p>
<p>Every morning, like so many of her colleagues, a television writer would drive from her Hollywood apartment to the Culver City, California, lot of Sony Pictures Entertainment. Greeting her at the gate most days was “this really, really nice woman who said, ‘Happy Monday! Happy Tuesday! Happy Wednesday!’ ” she says. “Like, welcome to the fake small town that you work in!” </p>
<p>One year ago, on Nov. 24, 2014, there was no “Happy Monday” when the screenwriter approached the Sony lot. Instead the guard told her to pull out her badge and swipe it to unlock the gate herself.</p>
<p>Across the lot, select company computers were playing a movie Sony hadn’t produced. I</p>
<p>It was signed, “Hacked by #GOP.”</p>
<p>Early reviews were lukewarm. “It felt like getting hacked in the early ’90s,” says one Sony employee</p>
<p> “The message looked like something out of Hackers, the movie. Like, You’ve been hacked, bitch! It was a throwback. Almost cute.” Nobody knew that “it was the beginning of this terrible, awful experience that would stretch on forever and ever.”</p>
<p>Outside Sony, it would eventually seem as if all the studio&#8217;s info had been exposed for everyone to see. But inside the studio, nobody could access anything. “Everything was so completely destroyed. It was surreal. Everything was down,” one ex-employee told me. “It wasn’t just one system or one part of the lot or one building. The network was completely chewed up by the virus.&#8221;</p>
<p>“It was like a bomb went off,” one staffer says. “We looked around. We were still alive. So we started doing triage.”</p>
<p>The telephone directory vanished. Voicemail was offline. Computers became bricks.  Internet access on the lot was shuttered. The cafeteria went cash-only. Contracts—and the templates those contracts were based on—disappeared. Sony’s online database of stock footage was unsearchable. It was near impossible for Sony to communicate directly with its employees—much less ex-employees, who were also gravely affected by the hack—to inform them of what was even happening and what to do about it. “It was like moving back into an earlier time,” one employee says. The only way to reach other Sony staffers was to dial their number directly—if you could figure out what it was—or hunt them down and talk face to face.</p>
<p>At first, staffers were told that Sony was “working on an IT issue” and that systems should be online again soon. Instructions were relayed “like a game of telephone,” one employee says. </p>
<p> When workers first arrived on the lot that Monday morning, they got a message through a security guard or a colleague or a handwritten sign taped up to the wall: Don’t turn on your computer. Later, someone might pop in and deliver the latest directive fourth-hand: “Unplug your computer from the wall.“ Which plug? The network cable? The power cord? Who knows? Just unplug everything. Says one worker: “It was all the hysteria of not knowing.”</p>
<p>In the days after the hack, Sony set up a hotline for employees to call with questions about identity theft. It made psychological counselors available on campus. It had the FBI—whose agents were camped out on the lot for weeks, investigating the hack—host employee seminars on data security. Once email was back online, Sony sent staffers an internal memo nearly every day, most of them signed by Lynton himself. Lynton ate alone in the lot cafeteria and invited employees to come and chat. But company communications were often lacking in specifics—an “IT issue,” huh?—so workers hit their phones in search of answers, texting with colleagues, searching Twitter for the hackers’ hashtag, and passing around cellphone pictures of the spooky pink skeleton to staffers who hadn’t seen it yet. Rumors raced across the lot. Maybe it was North Korea. Or maybe it was that old PR guy who left on bad terms.</p>
<p>Some employees—among them lawyers, HR reps, tech and finance people—had jobs so integrated in Sony’s systems that their regular work ground to a halt. Many were instantly shifted to new duties, working to get systems back online.</p>
<p>“It was an Earth-shattering change,” an ex-employee says. “There was no ability to reference anything else that had happened before the hack.” One Sony contractor told me that, when he failed to receive his regular check a month after the hack, he called the company and was told: “Sorry, how much do we pay you?” Systems that got back online quickly were just a “rough draft,” a “weird middle ground,” and “built on sand,” various workers said—totally temporary and not customized to the actual work.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-3/#comment-1447505</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Oct 2015 09:13:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1447505</guid>
		<description><![CDATA[A short history of Sony hacks
http://www.networkworld.com/article/2998859/security/a-short-history-of-sony-hacks.html

The giant Japanese electronics company dazzled us with its Walkman and Discman in the late 70s/early 80s, as well as with its TVs, cameras and game consoles over the years. But things took a bad turn in 2005…]]></description>
		<content:encoded><![CDATA[<p>A short history of Sony hacks<br />
<a href="http://www.networkworld.com/article/2998859/security/a-short-history-of-sony-hacks.html" rel="nofollow">http://www.networkworld.com/article/2998859/security/a-short-history-of-sony-hacks.html</a></p>
<p>The giant Japanese electronics company dazzled us with its Walkman and Discman in the late 70s/early 80s, as well as with its TVs, cameras and game consoles over the years. But things took a bad turn in 2005…</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-3/#comment-1447504</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Oct 2015 09:12:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1447504</guid>
		<description><![CDATA[Revisiting the Infamous Sony BMG Rootkit Scandal 10 Years Later 
http://it.slashdot.org/story/15/10/28/1829203/revisiting-the-infamous-sony-bmg-rootkit-scandal-10-years-later?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29

Hackers really have had their way with Sony over the past year, taking down its Playstation Network last Christmas Day and creating an international incident by exposing confidential data from Sony Pictures Entertainment in response to The Interview. Some say all this is karmic payback for what&#039;s become known as a seminal moment in malware history: Sony BMG sneaking rootkits into music CDs 10 years ago in the name of digital rights management. &#039;In a sense, it was the first thing Sony did that made hackers love to hate them,&#039;

Sony BMG Rootkit Scandal: 10 Years Later
http://www.networkworld.com/article/2998251/malware-cybercrime/sony-bmg-rootkit-scandal-10-years-later.html

Object lessons from infamous 2005 Sony BMG rootkit security/privacy incident are many -- and Sony&#039;s still paying a price for its ham-handed DRM overreach today.]]></description>
		<content:encoded><![CDATA[<p>Revisiting the Infamous Sony BMG Rootkit Scandal 10 Years Later<br />
<a href="http://it.slashdot.org/story/15/10/28/1829203/revisiting-the-infamous-sony-bmg-rootkit-scandal-10-years-later?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29" rel="nofollow">http://it.slashdot.org/story/15/10/28/1829203/revisiting-the-infamous-sony-bmg-rootkit-scandal-10-years-later?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+Slashdot%2Fslashdot%2Fto+%28%28Title%29Slashdot+%28rdf%29%29</a></p>
<p>Hackers really have had their way with Sony over the past year, taking down its Playstation Network last Christmas Day and creating an international incident by exposing confidential data from Sony Pictures Entertainment in response to The Interview. Some say all this is karmic payback for what&#8217;s become known as a seminal moment in malware history: Sony BMG sneaking rootkits into music CDs 10 years ago in the name of digital rights management. &#8216;In a sense, it was the first thing Sony did that made hackers love to hate them,&#8217;</p>
<p>Sony BMG Rootkit Scandal: 10 Years Later<br />
<a href="http://www.networkworld.com/article/2998251/malware-cybercrime/sony-bmg-rootkit-scandal-10-years-later.html" rel="nofollow">http://www.networkworld.com/article/2998251/malware-cybercrime/sony-bmg-rootkit-scandal-10-years-later.html</a></p>
<p>Object lessons from infamous 2005 Sony BMG rootkit security/privacy incident are many &#8212; and Sony&#8217;s still paying a price for its ham-handed DRM overreach today.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-2/#comment-1445122</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 21 Oct 2015 07:55:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1445122</guid>
		<description><![CDATA[Sony finds some loose change, flings most of it at lawyers ... the rest at staff hit by &#039;North Korea&#039;
A few million dollars to be paid out in Interview fallout
http://www.theregister.co.uk/2015/10/21/sony_interview_settlement/

Sony Pictures Entertainment (SPE) has agreed to pay up to $8m (£5.18m) to settle a lawsuit stemming from its 2014 IT security meltdown.

The movie studio will pay out damages after the personal details of 47,000 current and former employees leaked onto the internet following a network breach said to have stemmed from its decision to release the film The Interview.

Under the terms of the settlement [PDF], Sony will pay out damages of up to $2m (£1.29m) to the current and former employees whose data was stolen by hackers, as well as a fund of up to $10,000 (£6,400) per employee and up to $2.5m (£1.61m) in total for any individuals who experienced identity theft or fraud as a result of the leak. Additionally, the studio will pay out $3.5m (£2.26m) to cover attorney fees and legal costs related to the lawsuit.]]></description>
		<content:encoded><![CDATA[<p>Sony finds some loose change, flings most of it at lawyers &#8230; the rest at staff hit by &#8216;North Korea&#8217;<br />
A few million dollars to be paid out in Interview fallout<br />
<a href="http://www.theregister.co.uk/2015/10/21/sony_interview_settlement/" rel="nofollow">http://www.theregister.co.uk/2015/10/21/sony_interview_settlement/</a></p>
<p>Sony Pictures Entertainment (SPE) has agreed to pay up to $8m (£5.18m) to settle a lawsuit stemming from its 2014 IT security meltdown.</p>
<p>The movie studio will pay out damages after the personal details of 47,000 current and former employees leaked onto the internet following a network breach said to have stemmed from its decision to release the film The Interview.</p>
<p>Under the terms of the settlement [PDF], Sony will pay out damages of up to $2m (£1.29m) to the current and former employees whose data was stolen by hackers, as well as a fund of up to $10,000 (£6,400) per employee and up to $2.5m (£1.61m) in total for any individuals who experienced identity theft or fraud as a result of the leak. Additionally, the studio will pay out $3.5m (£2.26m) to cover attorney fees and legal costs related to the lawsuit.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-2/#comment-1445093</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 21 Oct 2015 06:53:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1445093</guid>
		<description><![CDATA[Ted Johnson / Variety: 	
Sony Pictures settlement of cyber attack lawsuit includes identity theft protection through 2017, $4.5M in reimbursement funds

Sony Cyber Attack Settlement Includes ID Theft Protection, $4.5 Mil Reimbursement Funds
http://variety.com/2015/film/news/sony-hack-class-action-settlement-id-theft-protection-1201621993/

The settlement reached by Sony Pictures Entertainment and ex-employees who sued over last year’s massive cyber attack includes additional years of identity protection services, a $2 million fund to compensate for unreimbursed expenses and up to $2.5 million for losses from ID theft.

The terms of the settlement were disclosed in a filing with U.S. District Court in Los Angeles on Monday.

Ten former Sony employees filed class action lawsuits in December and January, in cases that were eventually consolidated. In September, the studio and the ex-employees informed the court that they had reached an agreement.

The settlement also provides for the class counsel to receive $3.5 million in attorneys fees, costs and expenses.]]></description>
		<content:encoded><![CDATA[<p>Ted Johnson / Variety:<br />
Sony Pictures settlement of cyber attack lawsuit includes identity theft protection through 2017, $4.5M in reimbursement funds</p>
<p>Sony Cyber Attack Settlement Includes ID Theft Protection, $4.5 Mil Reimbursement Funds<br />
<a href="http://variety.com/2015/film/news/sony-hack-class-action-settlement-id-theft-protection-1201621993/" rel="nofollow">http://variety.com/2015/film/news/sony-hack-class-action-settlement-id-theft-protection-1201621993/</a></p>
<p>The settlement reached by Sony Pictures Entertainment and ex-employees who sued over last year’s massive cyber attack includes additional years of identity protection services, a $2 million fund to compensate for unreimbursed expenses and up to $2.5 million for losses from ID theft.</p>
<p>The terms of the settlement were disclosed in a filing with U.S. District Court in Los Angeles on Monday.</p>
<p>Ten former Sony employees filed class action lawsuits in December and January, in cases that were eventually consolidated. In September, the studio and the ex-employees informed the court that they had reached an agreement.</p>
<p>The settlement also provides for the class counsel to receive $3.5 million in attorneys fees, costs and expenses.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-2/#comment-1436818</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 20 Sep 2015 05:44:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1436818</guid>
		<description><![CDATA[SONY HACK WAS WAR says FBI, and &#039;we&#039;re still struggling to hire talent&#039;
Cybercrims may be safe at home, but Feds dare them to go on holiday
http://www.theregister.co.uk/2015/09/18/sony_hack_was_war_says_fbi_still_struggling_to_hire_talent/

Cloudsec Yesteryear&#039;s hack of Sony Pictures was an act of war, stated FBI Supervisory Special Agent Timothy Wallach, who delivered the FBI&#039;s gradation system of cybercriminals to net security conference Cloudsec on Thursday, 17 September.

US agencies have fingered the North Korean government for the Sony attack repeatedly, initially to much scorn as the nation is popularly believed to be residing in the technical dark ages.

However, the Norks role in the breach has been increasingly accepted, as information about the NSA&#039;s role in attribution has been made public.

Presenting the act of war at one end of the spectrum, with hacktivists at the other end, FBI Supervisory Special Agent Timothy Wallach told Cloudsec about the agency&#039;s ongoing efforts to deal with cybercrime.

Wallach made it clear the FBI distinguished hacktivists – a term he suggested covered ideological actors, including everyone from LOIC and Lizard Stresser ego-hackers, through to those defacing police websites following the shootings of young African American men – from those cybercriminals who were motivated by financial gain or espionage.

The hack of Sony pictures, he suggested, was an act of warfare, though it remains unclear how it might be considered a military act of sabotage, other than its nation-state backing.

According to Wallach, who is currently assigned to lead the Cyber Task Force in the Seattle Field Office of the FBI, reports of breaches increased by 55 per cent between 2013 and 2014.

These breaches often targeted personal identifiable information, although an increasing number went after healthcare information, which Wallach regards as a larger target.]]></description>
		<content:encoded><![CDATA[<p>SONY HACK WAS WAR says FBI, and &#8216;we&#8217;re still struggling to hire talent&#8217;<br />
Cybercrims may be safe at home, but Feds dare them to go on holiday<br />
<a href="http://www.theregister.co.uk/2015/09/18/sony_hack_was_war_says_fbi_still_struggling_to_hire_talent/" rel="nofollow">http://www.theregister.co.uk/2015/09/18/sony_hack_was_war_says_fbi_still_struggling_to_hire_talent/</a></p>
<p>Cloudsec Yesteryear&#8217;s hack of Sony Pictures was an act of war, stated FBI Supervisory Special Agent Timothy Wallach, who delivered the FBI&#8217;s gradation system of cybercriminals to net security conference Cloudsec on Thursday, 17 September.</p>
<p>US agencies have fingered the North Korean government for the Sony attack repeatedly, initially to much scorn as the nation is popularly believed to be residing in the technical dark ages.</p>
<p>However, the Norks role in the breach has been increasingly accepted, as information about the NSA&#8217;s role in attribution has been made public.</p>
<p>Presenting the act of war at one end of the spectrum, with hacktivists at the other end, FBI Supervisory Special Agent Timothy Wallach told Cloudsec about the agency&#8217;s ongoing efforts to deal with cybercrime.</p>
<p>Wallach made it clear the FBI distinguished hacktivists – a term he suggested covered ideological actors, including everyone from LOIC and Lizard Stresser ego-hackers, through to those defacing police websites following the shootings of young African American men – from those cybercriminals who were motivated by financial gain or espionage.</p>
<p>The hack of Sony pictures, he suggested, was an act of warfare, though it remains unclear how it might be considered a military act of sabotage, other than its nation-state backing.</p>
<p>According to Wallach, who is currently assigned to lead the Cyber Task Force in the Seattle Field Office of the FBI, reports of breaches increased by 55 per cent between 2013 and 2014.</p>
<p>These breaches often targeted personal identifiable information, although an increasing number went after healthcare information, which Wallach regards as a larger target.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-2/#comment-1432314</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 04 Sep 2015 07:04:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1432314</guid>
		<description><![CDATA[Sony hack nears end credits as firm reaches settlement with ex-employees
Fall out from The Interview hack continues to rain down 
http://www.theinquirer.net/inquirer/news/2424379/sony-hack-nears-end-credits-as-firm-reaches-settlement-with-ex-employees

SONY IS STILL feeling the effects of the possible North Korean hack on its film business, but is close to ending at least one part of the problem: the settlement of a lawsuit filed by some of the firm&#039;s affected employees.

The hack on Sony stripped it of data and dignity and plunged all elements of its business into the spotlight. There are a lot of ramifications to deal with. One of these, a lawsuit raised by employees who had their data breached and posted online, could be coming to a conclusion.

The class action suit followed the assault on SPE that peeled the company like a banana and released the fruit to the masses. The firm was put under the thumb of the hackers, thought to be North Korean, and its documents were shared by outfits including WikiLeaks.

&quot;There is no playbook for this, so you are in essence trying to look at the situation as it unfolds and make decisions without being able to refer to a lot of experiences you&#039;ve had in the past or other people&#039;s experiences. You&#039;re on completely new ground.&quot;]]></description>
		<content:encoded><![CDATA[<p>Sony hack nears end credits as firm reaches settlement with ex-employees<br />
Fall out from The Interview hack continues to rain down<br />
<a href="http://www.theinquirer.net/inquirer/news/2424379/sony-hack-nears-end-credits-as-firm-reaches-settlement-with-ex-employees" rel="nofollow">http://www.theinquirer.net/inquirer/news/2424379/sony-hack-nears-end-credits-as-firm-reaches-settlement-with-ex-employees</a></p>
<p>SONY IS STILL feeling the effects of the possible North Korean hack on its film business, but is close to ending at least one part of the problem: the settlement of a lawsuit filed by some of the firm&#8217;s affected employees.</p>
<p>The hack on Sony stripped it of data and dignity and plunged all elements of its business into the spotlight. There are a lot of ramifications to deal with. One of these, a lawsuit raised by employees who had their data breached and posted online, could be coming to a conclusion.</p>
<p>The class action suit followed the assault on SPE that peeled the company like a banana and released the fruit to the masses. The firm was put under the thumb of the hackers, thought to be North Korean, and its documents were shared by outfits including WikiLeaks.</p>
<p>&#8220;There is no playbook for this, so you are in essence trying to look at the situation as it unfolds and make decisions without being able to refer to a lot of experiences you&#8217;ve had in the past or other people&#8217;s experiences. You&#8217;re on completely new ground.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/12/14/sony-pictures-hack-was-a-long-time-coming-say-former-employees-fusion/comment-page-2/#comment-1412373</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 28 Jun 2015 17:18:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=29016#comment-1412373</guid>
		<description><![CDATA[Peter Elkind / Fortune:
Instead of hardening security defenses, Sony Pictures focused on offending North Koreans less, and was more afraid of security costs than risks

Inside the Sony Hack
A cyber-invasion brought Sony Pictures to its knees and terrified corporate America. The story of what really happened—and why Sony should have seen it coming. A special three-part investigation.

Part 1: Who was manning the ramparts at Sony Pictures?
http://fortune.com/sony-hack-part-1/

Part 2: The storm builds
http://fortune.com/sony-hack-part-two/]]></description>
		<content:encoded><![CDATA[<p>Peter Elkind / Fortune:<br />
Instead of hardening security defenses, Sony Pictures focused on offending North Koreans less, and was more afraid of security costs than risks</p>
<p>Inside the Sony Hack<br />
A cyber-invasion brought Sony Pictures to its knees and terrified corporate America. The story of what really happened—and why Sony should have seen it coming. A special three-part investigation.</p>
<p>Part 1: Who was manning the ramparts at Sony Pictures?<br />
<a href="http://fortune.com/sony-hack-part-1/" rel="nofollow">http://fortune.com/sony-hack-part-1/</a></p>
<p>Part 2: The storm builds<br />
<a href="http://fortune.com/sony-hack-part-two/" rel="nofollow">http://fortune.com/sony-hack-part-two/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
